Cybersecurity and the MBA

a dissertation

Business & Finance, Business Reference, Education, Nonfiction, Computers, Internet, Security, Advanced Computing, Information Technology
Cover of the book Cybersecurity and the MBA by Reynolds H John, Wicklit Publishing House, LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Reynolds H John ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC Language: English
Author: Reynolds H John
ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC
Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC
Language: English

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

More books from Information Technology

Cover of the book Practical Data Analysis and Reporting with BIRT by Reynolds H John
Cover of the book Read-Out and Coherent Manipulation of an Isolated Nuclear Spin by Reynolds H John
Cover of the book Guide to Reliable Distributed Systems by Reynolds H John
Cover of the book Mastering phpMyAdmin 3.4 for Effective MySQL Management by Reynolds H John
Cover of the book PICAXE by Reynolds H John
Cover of the book Finite Sample Analysis in Quantum Estimation by Reynolds H John
Cover of the book Java 7 JAX-WS Web Services by Reynolds H John
Cover of the book Metasploit Penetration Testing Cookbook by Reynolds H John
Cover of the book Tools and Environments for Parallel and Distributed Systems by Reynolds H John
Cover of the book Recommender Systems by Reynolds H John
Cover of the book RFID Technologies for Internet of Things by Reynolds H John
Cover of the book Web Programming with PHP and MySQL by Reynolds H John
Cover of the book The Digital Era 1 by Reynolds H John
Cover of the book iPad For Photographers 2nd edition by Reynolds H John
Cover of the book 55 Schritte zum Social Media Profi - Die besten Tipps im Umgang mit sozialen Netzwerken by Reynolds H John
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy